Heavy-hitters in the tech industry agree to adhere to the European Commission’s hate speech rules and vow to remove infringing postings within 24 hours after notification.
8 Ways To Secure Data During US-EU Privacy Fight
European regulators and tech giants Google, Microsoft, Twitter, and Facebook have struck an agreement to combat terrorism via a code of conduct that calls for the prompt removal of hate speech, the European Commission announced Tuesday.
The official Bangladesh government probe into the $81 million dollar theft via SWIFT in February has suggested the possibility of insider involvement. In February 2016 attackers successfully tricked the New York Federal Reserve Bank into transferring $81 million from the Bangladesh central bank to accounts in the Philippines. Before today, the primary Bangladesh line has been to blame SWIFT for the breach.
Email addresses and hashed and salted passwords of 65 million Tumblr users are being sold online by “peace_of_mind,” aka “Peace”, the individual that recently offered for sale LinkedIn users’ data dating back to a 2012 breach.
Apple devices are gaining popularity with a dubious group: cybercriminals. As noted byITProPortal, iOS threat XcodeGhost has now cracked the top three “most common” families of active malware.
According to SecurityWeek, meanwhile, a new threat is on the horizon for iOS. Called sandjacking, it’s a new way for malicious actors to crack Apple protections, install rogue apps and get access to sensitive user files. Here’s how attackers are breaking out of the box.
The Iranian government has given apps with data on Iranian users a year to move that data onto Iran-based servers, Reuters has reported. The move is a bid to keep closer tabs on conversations being conducted by Iranian citizens and crack down on the sharing of what the government considers “immoral content.”
A new TorrentLocker campaign has been detected by Heimdal Security that is geographically focused on Sweden. And like earlier campaigns, this ransomware threat is delivered by email spam – this one spoofing an invoice from the international Telia communications firm headquartered in Stockholm, Sweden. If this campaign follows the traditional TorrentLocker route, the target area will expand to other specific areas in the future.
NS1 CEO says other DNS providers also have been attacked over the past few months.
A sophisticated, sustained, and ongoing distributed denial-of-service (DDoS) attack on DNS and traffic management firm NS1 highlights what the company’s CEO says is a clear escalation in attacks against organizations in this space over the past several months.
The criminals behind phishing attacks are creating vast numbers of unique Web pages to host their attacks in an attempt to dodge defenses, according to an industry report.
The number of distinct Website links in phishing attacks jumped by more than 150 percent in five months, showing that phishing remains a major vector of compromise, the Anti-Phishing Working Group stated in a report released on May 24.In March 2016, phishing emails seen by APWG members contained more than 123,000 unique URLs, up from 48,000 in October 2015. While the number of URLs has increased dramatically, the number of domains and the number of brands used as camouflage by phishers have remained relatively constant at about 20,000 and 418, respectively, according to the report.
Many WordPress-, Joomla-, Magento- and Drupal-driven websites aren’t being updated, making them susceptible to phishing exploits and malware
If you’ve been putting off software updates on websites that you’ve developed, been bamboozled into managing, or somehow become inexplicably responsible for, you’re not alone. All of the major content management systems (CMS) website brands are out of date much of the time.